The authors lay out the security framework and challenges that face election administration today, specifically focusing on cybersecurity and cyber threats. The chapter presents the current array of actors and initiatives involved addressing these threats and discusses cybersecurity challenges faced by local jurisdictions during the 2016 election. The authors then conclude the chapter with a discussion of ways these threats are being addressed.
KeywordsCyber security Hacking Critical infrastructure
- Agawu, Emefa Addo. “How to Think About Election Cybersecurity: A Guide for Policymakers.” April 3, 2018. https://www.newamerica.org/cybersecurity-initiative/policy-papers/how-to-think-about-election-cybersecurity/.
- Alvarez, R. Michael, Lonna Rae Atkeson, and Thad E. Hall. Evaluating Elections: A Handbook of Methods and Standards. New York: Cambridge University Press, 2013.Google Scholar
- DeSilver, Drew. “On Election Day, Most Voters Use Electronic or Optical-Scan Ballots.” Pew Research Center, November 8, 2016. http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/.
- Goudie, Chuck, and Christine Tressel. “How the Russians Penetrated Illinois Election Computers.” ABC 7 Live Chicago, July 19, 2018. https://abc7chicago.com/politics/how-the-russians-penetrated-illinois-election-computers/3778816/.
- Government Accountability Office. “Critical Infrastructure Protection: Additional Actions Are Essential for Assessing Cybersecurity Framework Adoption.” February 2018. https://www.gao.gov/assets/700/690112.pdf.
- Hawkins, Derek, “The Cybersecurity 202: Voters’ Distrust of Election Security Is Just as Powerful as an Actual Hack, Officials Worry.” Washington Post, June 5, 2018. https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2018/06/05/the-cybersecurity-202-voters-distrust-of-election-security-is-just-as-powerful-as-an-actual-hack-officials-worry/5b1567091b326b08e883912f/?utm_term=.7a03e7805651.
- “Illinois Voter Registration System Database Breach Report.” n.d. https://www.intelligence.senate.gov/sites/default/files/documents/os-ssandvoss-062117_0.pdf.
- Jeh, Johnson. “Readout of Secretary Johnson’s Call with State Election Officials on Cybersecurity.” Department of Homeland Security, August 15, 2016. https://www.dhs.gov/news/2016/08/15/readout-secretary-johnsons-call-state-election-officials-cybersecurity.
- Levine, Mike. “Russia Likely Targeted All 50 States in 2016, but Has Yet to Try Again, DHS Cyber Chief Says.” ABC News, April 24, 2018. https://abcnews.go.com/US/russia-targeted-50-states-2016-dhs-cyber-chief/story?id=54695520.
- Mook, Robby, Matt Rhoades, and Eric Rosenbach. “The State and Local Election Cybersecurity Playbook.” Belfer Center for Science and International Affairs, Harvard Kennedy School, February 2018. https://www.belfercenter.org/publication/state-and-local-election-cybersecurity-playbook.
- Yaffa, Joshua. “Russia’s View of the Election Hacks: Denials, Amusement, Comeuppance.” The New Yorker, December 20, 2017. https://www.newyorker.com/news/news-desk/russias-view-of-the-election-hacks-denials-amusement-comeuppance.